54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
..
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
|
feet, mail-drones, commuters, who just pick up and
dump files through their cellphone WiFi, etc.
**Silktorrent e-mail or an instant messaging
service can be implemented by saving extra
records to a separate database, where there is a
relation between the tar-file name, recipient ID and
suggested-deletion-date.**
Counter-measures for Denial-of-Service attacks is
based on authentication, timing, location(channel).
One of the core ideas of the Silktorrent is that
the Silktorrent applications must assume that the
location of the tar-file can not be concluded from
its name. Silktorrent applications ask for tar-files
from agents, who might not have the asked tar-file
available and the agents might not even be able to
retrieve the asked tar-file. The agents are free to
use whatever [crazy](http://longterm.softf1.com/specifications/lightmsgp/v2/)
addressing scheme that they want.
---------------------------------------------------------------------------
## Further Censorship Countermeasures
................................................................................
e-mail server, told the e-mail server the
suggested-deletion-date. The header contains a file
named
./silktorrent_salt.txt
which probabilistically guarantees that the
size and bits-tream of the payload can not be
fully deduced from the tar-file name, forcing
censoring parties to download a considerable
amount of tar-files that they do not need.
---------------------------------------------------------------------------
|
|
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
..
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
|
feet, mail-drones, commuters, who just pick up and
dump files through their cellphone WiFi, etc.
**Silktorrent e-mail or an instant messaging
service can be implemented by saving extra
records to a separate database, where there is a
relation between the tar-file name, recipient ID and
suggested-deletion-date.**
Counter-measures for Denial-of-Service attacks are
based on authentication, timing, location(channel).
One of the core ideas of the Silktorrent is that
the Silktorrent applications must assume that the
location of the tar-file can not be concluded from
its name. Silktorrent applications ask for tar-files
from agents, who might not have the requested tar-file
available and the agents might not even be able to
retrieve the requested tar-file. The agents are free to
use whatever [crazy](http://longterm.softf1.com/specifications/lightmsgp/v2/)
addressing scheme that they want.
---------------------------------------------------------------------------
## Further Censorship Countermeasures
................................................................................
e-mail server, told the e-mail server the
suggested-deletion-date. The header contains a file
named
./silktorrent_salt.txt
which probabilistically guarantees that the
size and bit-stream of the payload can not be
fully deduced from the tar-file name, forcing
censoring parties to download a considerable
amount of tar-files that they do not need.
---------------------------------------------------------------------------
|